General

  • Target

    403dcf9ea2344b085ed1df8681911d3be36fdc181310eb9587c1305d4e172c73

  • Size

    316KB

  • Sample

    221123-ke7fpaha35

  • MD5

    aae2db4305d017c65cd1779938e3bfda

  • SHA1

    4a17ec40754b8a91b814ae6c0af0be372f0ff97c

  • SHA256

    403dcf9ea2344b085ed1df8681911d3be36fdc181310eb9587c1305d4e172c73

  • SHA512

    9beaba8c49b67135cc48ae3c87b83b806c2fc2fea107520c89cc2ee5a2b28e7407feb8a5892d4234fd587510781fc492694d9a8c304e11a9fc2ec495d1c9190d

  • SSDEEP

    6144:6ribUzkuvcBYC47l2xLNaFmoKZLxtHU/TMDkW01eedmQb+xR:6r7kuveY33FJUo7MDkA6s

Score
7/10

Malware Config

Targets

    • Target

      403dcf9ea2344b085ed1df8681911d3be36fdc181310eb9587c1305d4e172c73

    • Size

      316KB

    • MD5

      aae2db4305d017c65cd1779938e3bfda

    • SHA1

      4a17ec40754b8a91b814ae6c0af0be372f0ff97c

    • SHA256

      403dcf9ea2344b085ed1df8681911d3be36fdc181310eb9587c1305d4e172c73

    • SHA512

      9beaba8c49b67135cc48ae3c87b83b806c2fc2fea107520c89cc2ee5a2b28e7407feb8a5892d4234fd587510781fc492694d9a8c304e11a9fc2ec495d1c9190d

    • SSDEEP

      6144:6ribUzkuvcBYC47l2xLNaFmoKZLxtHU/TMDkW01eedmQb+xR:6r7kuveY33FJUo7MDkA6s

    Score
    7/10
    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks